Video: Blackbox JTAG Reverse Engineering


Felix Domke has been working on reverse engineering blackbox devices using the JTAG interface and presented this talk at the 26C3 Chaos Communications Congress conference.

JTAG is an industry standard for accessing testmode functionality in almost any complex microchip. While the basics of JTAG are standardized, the exact implementation details are usually undocumented. Nevertheless, JTAG often allows you to interact with the chip very deeply, which makes it very interesting since it is often easily accessible thanks to the small pincount. This talk covers reverse engineering of JTAG interfaces when no or only limited documentation is available.

The short PDF paper accompanying this presentation is available from the Chaos Communication Congress. [Note: the documentation for the reference to the “JTAG Finder” program in the paper’s footnote has been moved here.]

This entry was posted in JTAG, reversed, Videos and tagged , .

Comments

  1. Sjaak says:

    coincidently dave of eevblog posted about the workings of jtag: http://www.eevblog.com/2013/07/27/eevblog-499-what-is-jtag-and-boundary-scan/

  2. Srikanth Ala says:

    This Video is Really Awsome..

    We are designing our own JTAG, So, I think It will Help Us.

    Thank You.

Leave a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Notify me of followup comments via e-mail. You can also subscribe without commenting.